
Year 9 Spr1 Lesson 7 PREVENTION
Authored by Thomas Reynolds
Information Technology (IT)
8th Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
40 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a possible consequence to a business of a cyber-attack?
Loss of customer trust
Increased revenue
Improved security
Expansion of business
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the possible consequences to a business of a cyber-attack?
Loss of data / financial data / reputation
Operational / financial / commercial disruption
Safety of equipment, with personal safety implications
All of the above
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Identify basic physical and logical cyber-security prevention methods.
Firewalls and antivirus software
Encryption and access controls
Security policies and employee training
All of the above
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best compares different methods of physical and logical security?
Physical security involves protecting hardware and facilities, while logical security protects data and software.
Logical security involves protecting hardware and facilities, while physical security protects data and software.
Both physical and logical security focus on protecting data and software.
Physical security and logical security are the same and focus on protecting hardware.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Evaluate different methods of physical and logical security.
Physical security includes methods like surveillance cameras and locks, while logical security involves firewalls and encryption.
Physical security involves firewalls and encryption, while logical security includes surveillance cameras and locks.
Both physical and logical security involve only digital methods.
Physical security and logical security are the same and involve only physical barriers.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Fill in the blank: _______ methods prevent a user from physically gaining access to a device.
Physical
Logical
Virtual
Remote
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Fill in the blank: _______ methods use software to restrict user access to data.
Logical
Physical
Biometric
Token-based
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?